Vulnerabilities > Microsoft > Windows 10 1809 > 10.0.17763.6659

DATE CVE VULNERABILITY TITLE RISK
2025-03-11 CVE-2025-24984 Information Exposure Through Log Files vulnerability in Microsoft products
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
low complexity
microsoft CWE-532
4.6
2025-03-11 CVE-2025-24991 Out-of-bounds Read vulnerability in Microsoft products
Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
local
low complexity
microsoft CWE-125
5.5
2025-03-11 CVE-2025-24993 Heap-based Buffer Overflow vulnerability in Microsoft products
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
local
low complexity
microsoft CWE-122
7.8
2025-03-11 CVE-2025-26633 Improper Enforcement of Message or Data Structure vulnerability in Microsoft products
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.
local
high complexity
microsoft CWE-707
7.0
2025-02-11 CVE-2025-21184 Unspecified vulnerability in Microsoft products
Windows Core Messaging Elevation of Privileges Vulnerability
local
high complexity
microsoft
7.0
2025-02-11 CVE-2025-21190 Unspecified vulnerability in Microsoft products
Windows Telephony Service Remote Code Execution Vulnerability
network
low complexity
microsoft
8.8
2025-02-11 CVE-2025-21200 Unspecified vulnerability in Microsoft products
Windows Telephony Service Remote Code Execution Vulnerability
network
low complexity
microsoft
8.8
2025-02-11 CVE-2025-21201 Unspecified vulnerability in Microsoft products
Windows Telephony Server Remote Code Execution Vulnerability
network
low complexity
microsoft
8.8
2025-02-11 CVE-2025-21212 Unspecified vulnerability in Microsoft products
Internet Connection Sharing (ICS) Denial of Service Vulnerability
low complexity
microsoft
6.5
2025-02-11 CVE-2025-21216 Unspecified vulnerability in Microsoft products
Internet Connection Sharing (ICS) Denial of Service Vulnerability
low complexity
microsoft
6.5